Search Header Logo

Assets and Threats: Quiz 4

Authored by John Coder

Computers

Professional Development

Assets and Threats: Quiz 4
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

29 questions

Show all answers

1.

FILL IN THE BLANKS QUESTION

1 min • 1 pt

Hash values are primarily used as a way to determine the int___________ of files and applications. Hashes also keep information confi____________ because they can't be decrypted.

(a)  

2.

FILL IN THE BLANKS QUESTION

1 min • 1 pt

Data integrity relates to the accuracy and consistency of information. This is known as non-repud_____________, the concept that authenticity of information can't be de___________.

(a)  

3.

FILL IN THE BLANKS QUESTION

1 min • 1 pt

Media Image

Hash values are primarily used as a way to determine the int___________ of files and applications. Hashes also keep information confi____________ because they can't be decrypted.

(a)  

4.

FILL IN THE BLANKS QUESTION

1 min • 1 pt

To avoid the risk of hash collisions, functions that generated longer values were needed. MD5's shortcomings gave way to a new group of functions known as the sec________ has_________ algor_________, or SHAs.

(a)  

5.

FILL IN THE BLANKS QUESTION

1 min • 1 pt

Five fun (a)   make up the SHA family of algorithms:

SHA-1

SHA-224

SHA-256

SHA-384

SHA-512

6.

FILL IN THE BLANKS QUESTION

1 min • 1 pt

A rainbow table is a file of pre-generated hash values and their associated plaintext. They’re like dictio (a)   of weak passwords. Attackers capable of obtaining an organization’s password database can use a rainbow table to compare them against all possible values.

7.

FILL IN THE BLANKS QUESTION

1 min • 1 pt

Media Image

Salting is an additional safeguard that's used to strengthen hash functions. A salt is a random str (a)   of characters that's added to data before it's hashed. The additional characters produce a more unique hash value, making salted data resilient to rainbow table attacks.

For example, a database containing passwords might have several hashed entries for the password "password." If those passwords were all salted, each entry would be completely different. That means an attacker using a rainbow table would be unable to find matching values for "password" in the database.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?